1,418 research outputs found
Chimeras in Leaky Integrate-and-Fire Neural Networks: Effects of Reflecting Connectivities
The effects of nonlocal and reflecting connectivity are investigated in
coupled Leaky Integrate-and-Fire (LIF) elements, which assimilate the exchange
of electrical signals between neurons. Earlier investigations have demonstrated
that non-local and hierarchical network connectivity often induces complex
synchronization patterns and chimera states in systems of coupled oscillators.
In the LIF system we show that if the elements are non-locally linked with
positive diffusive coupling in a ring architecture the system splits into a
number of alternating domains. Half of these domains contain elements, whose
potential stays near the threshold, while they are interrupted by active
domains, where the elements perform regular LIF oscillations. The active
domains move around the ring with constant velocity, depending on the system
parameters. The idea of introducing reflecting non-local coupling in LIF
networks originates from signal exchange between neurons residing in the two
hemispheres in the brain. We show evidence that this connectivity induces novel
complex spatial and temporal structures: for relatively extensive ranges of
parameter values the system splits in two coexisting domains, one domain where
all elements stay near-threshold and one where incoherent states develop with
multileveled mean phase velocity distribution.Comment: 12 pages, 12 figure
Multi-chimera States in the Leaky Integrate-and-Fire Model
We study the dynamics of identical leaky integrate-and-fire neurons with symmetric non-local coupling. Upon varying control parameters (coupling strength, coupling range, refractory period) we investigate the system's behaviour and highlight the formation of chimera states. We show that the introduction of a refractory period enlarges the parameter region where chimera states appear and affects the chimera multiplicity
Threshold cryptography based on asmuth-bloom secret sharing
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects. © Springer-Verlag Berlin Heidelberg 2006
A kilobit hidden SNFS discrete logarithm computation
We perform a special number field sieve discrete logarithm computation in a
1024-bit prime field. To our knowledge, this is the first kilobit-sized
discrete logarithm computation ever reported for prime fields. This computation
took a little over two months of calendar time on an academic cluster using the
open-source CADO-NFS software. Our chosen prime looks random, and
has a 160-bit prime factor, in line with recommended parameters for the Digital
Signature Algorithm. However, our p has been trapdoored in such a way that the
special number field sieve can be used to compute discrete logarithms in
, yet detecting that p has this trapdoor seems out of reach.
Twenty-five years ago, there was considerable controversy around the
possibility of back-doored parameters for DSA. Our computations show that
trapdoored primes are entirely feasible with current computing technology. We
also describe special number field sieve discrete log computations carried out
for multiple weak primes found in use in the wild. As can be expected from a
trapdoor mechanism which we say is hard to detect, our research did not reveal
any trapdoored prime in wide use. The only way for a user to defend against a
hypothetical trapdoor of this kind is to require verifiably random primes
Practical threshold signatures with linear secret sharing schemes
Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among several parties. The necessary values for the computation are distributed to the participating parties using a secret sharing scheme (SSS). Several function sharing schemes have been proposed in the literature, with most of them using Shamir secret sharing as the underlying SSS. In this paper, we investigate how threshold cryptography can be conducted with any linear secret sharing scheme and present a function sharing scheme for the RSA cryptosystem. The challenge is that constructing the secret in a linear SSS requires the solution of a linear system, which normally involves computing inverses, while computing an inverse modulo φ(N) cannot be tolerated in a threshold RSA system in any way. The threshold RSA scheme we propose is a generalization of Shoup's Shamir-based scheme. It is similarly robust and provably secure under the static adversary model. At the end of the paper, we show how this scheme can be extended to other public key cryptosystems and give an example on the Paillier cryptosystem. © 2009 Springer Berlin Heidelberg
Lower Bounds for Leakage-Resilient Secret Sharing
Threshold secret sharing allows a dealer to split a secret into shares such that any authorized subset of cardinality at least of those shares efficiently reveals the secret, while at the same time any unauthorized subset of cardinality less than contains no information about the secret.
Leakage-resilience additionally requires that the secret remains hidden even if one is given a bounded amount of additional leakage from every share.
In this work, we study leakage-resilient secret sharing schemes and prove a lower bound on the share size and the required amount of randomness of any information-theoretically secure scheme.
We prove that for any information-theoretically secure leakage-resilient secret sharing scheme either the amount of randomness across all shares or the share size has to be linear in .
More concretely, for a secret sharing scheme with -bit long shares, -bit leakage per share, where shares uniquely define the remaining shares, it has to hold that
We use this lower bound to gain further insights into a question that was recently posed by Benhamouda et al. (CRYPTO\u2718), who ask to what extend existing regular secret sharing schemes already provide protection against leakage.
The authors proved that Shamir\u27s secret sharing is -bit leakage-resilient for reconstruction thresholds and conjectured that it is also -bit leakage-resilient for any other threshold that is a constant fraction of the total number of shares.
We do not disprove their conjecture, but show that it is the best one could possibly hope for.
Concretely, we show that for large enough and any constant it holds that Shamir\u27s secret sharing scheme is \emph{not} leakage-resilient for .
In contrast to the setting with information-theoretic security, we show that our lower bound does not hold in the computational setting.
That is, we show how to construct a leakage-resilient secret sharing scheme in the random oracle model that is secure against computationally bounded adversaries and violates the lower bound stated above
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
Achieving fairness and soundness in non-simultaneous rational secret sharing schemes has proved to be challenging.
On the one hand, soundness can be ensured by providing side information related to the secret as a check, but on the other, this can be used by deviant players to compromise fairness.
To overcome this, the idea of incorporating a time delay was suggested in the literature: in particular, time-delay encryption based on memory-bound functions has been put forth as a solution.
In this paper, we propose a different approach to achieve such delay, namely using homomorphic time-lock puzzles (HTLPs), introduced at CRYPTO 2019, and construct a fair and sound rational secret sharing scheme in the non-simultaneous setting from HTLPs.
HTLPs are used to embed sub-shares of the secret for a predetermined time. This allows to restore fairness of the secret reconstruction phase, despite players having access to information related to the secret which is required to ensure soundness of the scheme. Key to our construction is the fact that the time-lock puzzles are homomorphic so that players can compactly evaluate sub-shares. Without this efficiency improvement, players would have to independently solve each puzzle sent from the other players to obtain a share of the secret, which would be computationally inefficient.
We argue that achieving both fairness and soundness in a non-simultaneous scheme using a time delay based on CPU-bound functions rather than memory-bound functions is more cost effective and realistic in relation to the implementation of the construction
- …